ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 29

Question list
Search
Search

Related questions











On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored?

A.
SAM
A.
SAM
Answers
B.
AMS
B.
AMS
Answers
C.
Shadow file
C.
Shadow file
Answers
D.
Password.conf
D.
Password.conf
Answers
Suggested answer: A

Why is it still possible to recover files that have been emptied from the Recycle Bin on a Windows computer?

A.
The data is still present until the original location of the file is used
A.
The data is still present until the original location of the file is used
Answers
B.
The data is moved to the Restore directory and is kept there indefinitely
B.
The data is moved to the Restore directory and is kept there indefinitely
Answers
C.
The data will reside in the L2 cache on a Windows computer until it is manually deleted
C.
The data will reside in the L2 cache on a Windows computer until it is manually deleted
Answers
D.
It is not possible to recover data that has been emptied from the Recycle Bin
D.
It is not possible to recover data that has been emptied from the Recycle Bin
Answers
Suggested answer: A

When is it appropriate to use computer forensics?

A.
If copyright and intellectual property theft/misuse has occurred
A.
If copyright and intellectual property theft/misuse has occurred
Answers
B.
If employees do not care for their boss management techniques
B.
If employees do not care for their boss management techniques
Answers
C.
If sales drop off for no apparent reason for an extended period of time
C.
If sales drop off for no apparent reason for an extended period of time
Answers
D.
If a financial institution is burglarized by robbers
D.
If a financial institution is burglarized by robbers
Answers
Suggested answer: A

Madison is on trial for allegedly breaking into her university internal network. The police raided her dorm room and seized all of her computer equipment. Madison lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison lawyer trying to prove the police violated?

A.
The 10th Amendment
A.
The 10th Amendment
Answers
B.
The 5th Amendment
B.
The 5th Amendment
Answers
C.
The 1st Amendment
C.
The 1st Amendment
Answers
D.
The 4th Amendment
D.
The 4th Amendment
Answers
Suggested answer: D

Using Linux to carry out a forensics investigation, what would the following command accomplish? dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror

A.
Search for disk errors within an image file
A.
Search for disk errors within an image file
Answers
B.
Backup a disk to an image file
B.
Backup a disk to an image file
Answers
C.
Copy a partition to an image file
C.
Copy a partition to an image file
Answers
D.
Restore a disk from an image file
D.
Restore a disk from an image file
Answers
Suggested answer: D

In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?

A.
Security Administrator
A.
Security Administrator
Answers
B.
Network Administrator
B.
Network Administrator
Answers
C.
Director of Information Technology
C.
Director of Information Technology
Answers
D.
Director of Administration
D.
Director of Administration
Answers
Suggested answer: B

What will the following Linux command accomplish? dd if=/dev/mem of=/home/sam/mem.bin bs=1024

A.
Copy the master boot record to a file
A.
Copy the master boot record to a file
Answers
B.
Copy the contents of the system folder to a file
B.
Copy the contents of the system folder to a file
Answers
C.
Copy the running memory to a file
C.
Copy the running memory to a file
Answers
D.
Copy the memory dump file to an image file
D.
Copy the memory dump file to an image file
Answers
Suggested answer: C

Before performing a logical or physical search of a drive in Encase, what must be added to the program?

A.
File signatures
A.
File signatures
Answers
B.
Keywords
B.
Keywords
Answers
C.
Hash sets
C.
Hash sets
Answers
D.
Bookmarks
D.
Bookmarks
Answers
Suggested answer: B

When a router receives an update for its routing table, what is the metric value change to that path?

A.
Increased by 2
A.
Increased by 2
Answers
B.
Decreased by 1
B.
Decreased by 1
Answers
C.
Increased by 1
C.
Increased by 1
Answers
D.
Decreased by 2
D.
Decreased by 2
Answers
Suggested answer: C

When operating systems mark a cluster as used but not allocated, the cluster is considered as _________

A.
Corrupt
A.
Corrupt
Answers
B.
Bad
B.
Bad
Answers
C.
Lost
C.
Lost
Answers
D.
Unallocated
D.
Unallocated
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71